Image not found.  
 
 
Image not found. Image not found. Image not found. Image not found. Image not found. Image not found. Image not found. Image not found. Image not found.
       
 
Products & Services
 
 
Home > Products & Services > HR > Security
 
Security

Secure
We understand that your information is important. That’s why EmCentrix uses a
variety of methods to keep the information you put into the system secure.

Servers
EmCentrix’s servers are hosted by Latisys in a SAS 70 Type II certified facility. Latisys
provides an extensive set of security services based on the latest state-of-the-art
security technologies on the market. These security services are designed, deployed,
maintained and monitored 24x7x365 to provide the highest level enterprise security to
us on a contracted basis. In addition, Latisys is staffed by a certified security team to
ensure fast response to security incidents.

The facilities physical security measures include:
 
 
Image not found.
Onsite Security Personnel 24x7x365
 
 
Image not found.
Onsite 24x7x365 Network Operations Center, which monitors all external and
internal security
 
 
Image not found.
Closed circuit television security system throughout the data center
 
 
Image not found.
Combination proximity card and photo identification system required to gain
access to facility
 
 
Image not found.
Single Point of Contact (SPOC) for each client to ensure only authorized
personnel has physical access to colocation space Not only do Latisys’
facilities help keep our servers secure, they also provide an ideal operating
environment for our servers, including:
 
 
Image not found.
N+1 Cooling and Power Infrastructure
 
 
Image not found.
Redundant, Blended Networks
 
 
Image not found.
Ultra Sonic Humidification
 
 
Image not found.
AC and DC Power Capability
 
 
Image not found.
Advanced Fire Detection and Suppression Systems
 
 
Image not found.
24x7x365 On-Site Technical Staff
 
 
 
Firewall
EmCentrix uses Fortinet’s advanced FortiGate Antivirus Firewalls for Enterprise. FortiGate Antivirus Firewalls for Enterprise meets our enterprise-class requirement
for performance, availability and reliability. It includes all of the key capabilities
provided by other FortiGate models, with integrated, real-time antivirus, firewall,
VPN, network intrusion detection and prevention, and traffic-shaping services.

SSL
EmCentrix uses Secure Socket Layer (SSL) Certificates to encrypt your information
as it is transmitted over the Internet, ensuring that sensitive data remains private.

An SSL Certificate consists of a public key and a private key. The public key is used to encrypt information and the private key is used to decipher it. When a browser points to a secured domain, an SSL handshake authenticates the server and the client and establishes an encryption method and a unique session key. They can begin a secure session that guarantees message privacy and integrity.

Our system uses 128-bit to 256-bit encryption, the highest standard of security encryption normally available. Encryption strength is measured in key length — the number of bits in the key. To decipher an SSL communication, one needs to generate the correct decoding key. Mathematically speaking, 2n possible values exist for a key, where n is the number of bits. Thus, 40-bit encryption involves 240 possible values, 128-bit encryption involves 2128 combinations, and 256-bit keys involve a staggering 2256 possible combinations, rendering the encrypted data practically impervious to intrusion.

System Security
EmCentrix’s online human resources management system includes many security features designed to keep your company’s data secure. Below are some of the system’s important security features:
 
 
Image not found.
The system can be set to allow or deny access by IP addresses. When enabled, this setting lets you restrict access to the system only to a set of allowed IP addresses.
 
 
Image not found.
Every user can be assigned a unique username and password. Entering the system requires three levels of authentication; users must provide a company ID, username, and password to log in.
 
 
Image not found.
Passwords must contain a minimum of seven characters, including letters, numbers, and are case sensitive. Passwords can be set to expire, forcing users to change their passwords at set intervals. New users can be forced to change their password upon first login.
 
 
Image not found.
The system can be set to lock user accounts after a certain number of failed login attempts.
 
 
Image not found.
Employers and administrators can view a login tracking report, which displays a record of every login attempt, including the username, password, time, and IP address from which the login was attempted. Both failed and successful login attempts are recorded.
 
 
Image not found.
A change report provides you with a real-time audit trail that updates as changes are made. The report includes not only the details of the change, but also the user account that made the change, a timestamp, and the IP address the change was made from.
 
 
Image not found.
Terminated employees are automatically locked out of the system. Only active user accounts can access the system.
 
 
Image not found.
Individual modules may be password protected in addition to the standard system login.
 
 
 
Image not found.
Request a Demo
 
Let us show you how we can help your business.
 
  Send Request  
 
 
Image not found.
Request a Quote
 
Learn how affordable our solutions are for you.
 
  Request Quote  
 
 
Image not found.
Ask a Question  
 
Have a question that’s not answered on our website?  
 
  Ask Question  
 
 
Image not found.
   
Why EmCentrix  
 
What makes EmCentrix different?  
 
  Find Out  
 
   
 
Products & Services Development Partners Company Contact Us
Connect With Us
 
 
 
Image not found. Image not found. Image not found. Image not found.
HR Development Resellers About Us Schedule a Demo
Payroll Integrations Referrals Why EmCentrix Ask a Question
Time & Attendance Request a Quote
Benefits Contact Support
Administration
 
EmCentrix’s HRMS is not necessarily a “what you see is what you get” product. It is a highly flexible solution that can be tailored to your needs. Our experienced developers can modify the
system in countless ways; we can create new custom functions, reports, screens, exports, and integrations to make the system uniquely suited to your company’s needs. Our goal is to develop
your ideas and visions.
 
© EmCentrix, Inc. All rights reserved.  
 
Image not found.